~ubuntu-security/ubuntu-cve-tracker/master

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
PublicDateAtUSN: 2014-08-13
Candidate: CVE-2014-3165
PublicDate: 2014-08-13
References:
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3165
 https://src.chromium.org/viewvc/blink?revision=177359&view=revision
 https://code.google.com/p/chromium/issues/detail?id=390174
 http://googlechromereleases.blogspot.com/2014/08/stable-channel-update.html
 http://www.ubuntu.com/usn/usn-2320-1
Description:
 Use-after-free vulnerability in
 modules/websockets/WorkerThreadableWebSocketChannel.cpp in the Web Sockets
 implementation in Blink, as used in Google Chrome before 36.0.1985.143,
 allows remote attackers to cause a denial of service or possibly have
 unspecified other impact via vectors that trigger an unexpectedly long
 lifetime of a temporary object during method completion.
Ubuntu-Description:
Notes:
Bugs:
 https://bugs.launchpad.net/bugs/1360505
Priority: medium
Discovered-by: Collin Payne
Assigned-to:

Patches_chromium-browser:
upstream_chromium-browser: released (36.0.1985.143)
lucid_chromium-browser: ignored (reached end-of-life)
precise_chromium-browser: released (37.0.2062.94-0ubuntu0.12.04.1~pkg909)
trusty_chromium-browser: released (37.0.2062.94-0ubuntu0.14.04.1~pkg1042)
devel_chromium-browser: released (37.0.2062.94-0ubuntu1~pkg1065)

Patches_oxide-qt:
upstream_oxide-qt: released (1.0.5)
lucid_oxide-qt: DNE
precise_oxide-qt: DNE
trusty_oxide-qt: released (1.0.5-0ubuntu0.14.04.1)
devel_oxide-qt: released (1.1.1-0ubuntu3)